I've been pretty much the same way with prior processor-based vulnerabilities. But this seems a bit different as it doesn't require physical access to the computer and can even be exploited by a java script in a browser.
The "reproducible in Javascript" aspect isn't new or unique to this exploit. You can find other side-channel attacks which are, as well. The main difference seems to be how easy and prolific this one sounds, compared with the ones based on timing.
However, I think the Javascript-based method is probably one of the easier attack vectors to mitigate. If AMD can give the JIT developers enough information about the problematic instruction sequences, they can hopefully just tweak their engine to avoid generating them.
I think we can expect these exploits to start pretty soon now. A billion click-baits,
It's not just click-baits, but also potentially infected ads or cross-site scripts used by website authors.
Separately: the update says we can expect AGESA updates for desktop systems in the november-december timeframe. That's a long time! I wonder if this suggests it will be mitigated in a Windows security update first? I've read it's already mitigated in Linux kernel.
There are likely software mitigations that can fill the gap until updated microcode is available.
I have to wonder why there's such a lag between the fixes for Zen 2 server CPUs and client CPUs, when they're actually the same cores in both cases! I mean, that's central to AMD's chiplet strategy, right?